256 data-"https:" "https:" "https:" "https:" "https:" "https:" "https:" "UNIV" "Univ" uni jobs at Monash University
Sort by
Refine Your Search
-
Listed
-
Field
-
On their own, traffic accidents cause 1.3 million fatalities every year – and improper situational awareness is often a major cause. This project aims to exploit big spatio-temporal data to design
-
"A picture is worth a thousands words"... or so the saying goes. How much information can we extract from an image of an insect on a flower? What species is the insect? What species is the flower
-
the endless possibilities of digital sound, allowing the plucking of sounds out of thin air. URLs and Further Reading https://airsticks.xyz/ Ilsar, A.A., 2018. The AirSticks: a new instrument for live
-
This project examines how films produced in Asian markets perform in terms of commercial success and critical recognition using real-world industry data. Students will compile a dataset of films
-
threatened species and ecosystems, and to control invasive species and diseases. This requires a step-change in the data and methods used to monitor and predict organism behaviours and ultimately shifts in
-
The United Nations Development Programme has identified access to information as an essential element to support poverty eradication. People living in poverty are often unable to access information
-
will be developed to identify and reason over causal relationships among all associations from the data in literature. As the number of causal relationships is usually much smaller than
-
to avoid system bottlenecks, and ensuring low-latency performance. Energy-Efficient Operations with Carbon-Aware Scheduling: Example: For non-urgent data processing, SmartScaleSys (S3) could prioritize tasks
-
Anomaly detection is an important task in data mining. Traditionally most of the anomaly detection algorithms have been designed for ‘static’ datasets, in which all the observations are available
-
Privacy-Enhancing Technologies (PETs) are a set of cryptographic tools that allow information processing in a privacy-respecting manner. As an example, imagine we have a user, say Alice, who wants